• 公告ID (KylinSec-SA-2023-1036)

摘要:

On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS( C:/tmp ).Open( COM1 ) opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS( ) has changed. Previously, an empty root was treated equivalently to / , so os.DirFS( ).Open( tmp ) would open the path /tmp . This now returns an error.

安全等级: Low

公告ID: KylinSec-SA-2023-1036

发布日期: 2023年2月6日

关联CVE: CVE-2022-41720  

  • 详细介绍

1. 漏洞描述

   

On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS( C:/tmp ).Open( COM1 ) opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS( ) has changed. Previously, an empty root was treated equivalently to / , so os.DirFS( ).Open( tmp ) would open the path /tmp . This now returns an error.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-41720 KY3.4-4A golang Unaffected
CVE-2022-41720 KY3.4-5 golang Unaffected
CVE-2022-41720 KY3.5.1 golang Unaffected
CVE-2022-41720 KY3.5.2 golang Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2023-1035 下一篇:KylinSec-SA-2023-1037